Linux Privilege Escalation

Enmeration

Basic Enemetation

System Information Gathering

circle-info

Look for exploits related to the version of OS and kernal.

Finding internal Network information

Process and Network Information

Firewall and Scheduled Tasks Information

File Permissions and Installed Software

SUID/GID Privilege Escalation

More Enumeration help:

circle-info

Payloads ALL things is very good github repo for help.

Automated tool for enumeration

Linpeas

unix-privesc-check

Looking for credential reuse

Credential reuse here refers to the practice where the username and password are identical, such as "kali" for both fields. This is a form of weak credential management and is often associated with default or temporary credentials.

Check .ssh Directory and Copy id_rsa file

triangle-exclamation

Spreaing found ssh file

We can try to check if the found SSH private key corresponds to users on other hosts.

Command is shown here.

Way to do this is as follow:

Checking for Sudo version

You can match your version found in the script below:

For list matching
Main code

Exploiting Exposed Confidential information.

Inspecting Service Footprints & Privilege Escalation

Privilege Escalation

We can see exploitation of these capabilities on GTFObin.

Inspecting service footprints

Abusing cron jobs

Checking Cron Job Logs

Exploiting Writable Cron Jobs

Abusing Password authentication

Insecure System Components

Abusing SetUid Binary

Abusing Capabilities

Abusing Sudo

Exploiting kernel vulnerability

Revershell in .sh files

Last updated